-
工学博士(東北大学)
Details of the Researcher
Research History 5
-
2023/04 - PresentTohoku University President-appointed Extraordinary Professor
-
2015/12 - 2023/03Tohoku University Special Advisor to the President (for Higher Education Reform and Planning)
-
1995/04 - 2023/03Tohoku University Professor
-
1992/04 - 1995/03Tohoku University Associate Professor
-
1987/04 - 1992/03Tohoku University Assistant Professor
Education 2
-
Tohoku University Graduate School of Engineering
1982/04 - 1987/03
-
Tohoku University Faculty of Engineering
1977/04 - 1981/03
Committee Memberships 3
-
IEICE Technical Committee on Information Security, Advisor
2001/05 - 2013/05
-
CRYPTREC - Cryptography Research and Evaluation Committees Public Key Subcommittee, Member
2000/04 - 2003/03
-
IEICE Technical Committee on Information Security, Chair
2000/05 - 2001/05
Professional Memberships 2
-
IEICE
-
ACM SIGACT
Research Interests 2
-
Computational Complexity Theory
-
Cryptology
Research Areas 1
-
Informatics / Information theory / Cryptology
Awards 2
-
Outstanding Paper Award, The 8th International Symposium on Computing and Networking
2020/11 "Public-key Projective Arithmetic Functional Encryption"
-
The Telecommunication Advancement Foundation Promotion Award
1999/03 "Sharing Secret Keys along an Eulerian Circuit"
Papers 79
-
Preimage Sampling in the Higher-bit Approximate Setting With a Non-spherical Gaussian Sample Peer-reviewed
Anaëlle Le Dévéhat, Shingo Hasegawa, Hiroki Shizuya
The 25th Annual International Conference on Information Security and Cryptology (ICISC 2022) , Lecture Notes in Computer Science 13849 472-490 2023
-
On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem Peer-reviewed
Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa
2021 International Conference on Cryptology and Network Security (CANS2021), Lecture Notes in Computer Science 13099 253-272 2021/12
-
Public-key Projective Arithmetic Functional Encryption Peer-reviewed
Shingo Hasegawa, Masashi Hisai, Hiroki Shizuya
International Journal of Networking and Computing 11 (2) 299-318 2021
-
Computational Model of Card-Based Cryptographic Protocols and Its Applications Invited Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya
IEICE Trans on Fundamentals E100A (1) 3-11 2017/01
DOI: 10.1587/transfun.E100.A.3
ISSN: 1745-1337
-
A formalization of card-based cryptographic protocols via abstract machine Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya
International Journal of Information Security 13 (1) 15-23 2014/02
DOI: 10.1007/s10207-013-0219-4
ISSN: 1615-5262
eISSN: 1615-5270
-
On the pseudo-freeness and the CDH assumption Peer-reviewed
Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, Katsuhiro Tashiro
International Journal of Information Security 8 (5) 347-355 2009/10
DOI: 10.1007/s10207-009-0087-0
ISSN: 1615-5262
-
Divertible and subliminal-free zero-knowledge proofs for languages Peer-reviewed
Mike Burmester, Yvo G. Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya
Journal of Cryptology 12 (3) 197-223 1999
Publisher: Springer New York LLCISSN: 0933-2790
-
A structural comparison of the computational difficulty of breaking discrete log cryptosystems Peer-reviewed
Kouichi Sakurai, Hiroki Shizuya
Journal of Cryptology 11 (1) 29-43 1998
Publisher: Springer New YorkISSN: 0933-2790
-
A language-dependent cryptographic primitive Peer-reviewed
Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
Journal of Cryptology 10 (1) 37-49 1997
Publisher: Springer New YorkISSN: 0933-2790
-
On a Relation between Knowledge-of-exponent Assumptions and the DLog vs. CDH Question Peer-reviewed
Firas Kraiem, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya
IEICE Trans on Fundamentals E104-A (1) 20-24 2021/01
-
How to Implement a Non-uniform or Non-closed Shuffle Peer-reviewed
Takahiro Saito, Daiki Miyahara, Yuta Abe, Takaaki Mizuki, Hiroki Shizuya
9th International Conference on the Theory and Practice of Natural Computing (TPNC 2020), Lecture Notes in Computer Science 12494 107-118 2020
-
On the classification of knowledge-of-exponent assumptions in cyclic groups Peer-reviewed
Firas Kraiem, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya
Interdisciplinary Information Sciences 25 (1) 67-74 2019
Publisher: Graduate School of Information Sciences, Tohoku UniversityISSN: 1340-9050
eISSN: 1347-6157
-
On the Fixed Points of an Elliptic-Curve Version of Self-Power Map Peer-reviewed
Hiroki Shizuya
Interdisciplinary Information Sciences 24 (1) 87-90 2018
-
A Construction of Attribute-based Aggregate Signatures Peer-reviewed
Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya, Ryo Takahashi
Proc. 2016 International Symposium on Information Theory and Its Applications 76-80 2016/10
-
A Rigorous Security Proof for the Enhanced Version of Password-Protected Secret Sharing Scheme Peer-reviewed
Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya
Interdisciplinary Information Sciences 22 (1) 31-54 2016/02/09
-
A Strengthened Security Notion for Password-Protected Secret Sharing Schemes Peer-reviewed
Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya
IEICE Trans on Fundamentals E98A (1) 203-212 2015/01
DOI: 10.1587/transfun.E98.A.203
ISSN: 1745-1337
-
Password-protected Secret-sharing Schemes without Random Oracles Peer-reviewed
Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya
Proc. 2014 International Symposium on Information Theory and Its Applications 579-583 2014/10
-
On the Complexity of Computing Discrete Logarithms over Algebraic Tori (Journal version) Peer-reviewed
Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya
IEICE Trans on Information and Systems E97-D (3) 442-447 2014
ISSN: 0302-9743
-
The RSA Group Is Adaptive Pseudo-Free under the RSA Assumption Peer-reviewed
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
IEICE Trans on Fundamentals E97A (1) 200-214 2014/01
DOI: 10.1587/transfun.E97.A.200
ISSN: 0916-8508
eISSN: 1745-1337
-
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption Peer-reviewed
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
INFORMATION SECURITY AND PRIVACY, ACISP 2014, Lecture Notes in Computer Science 8544 290-305 2014
DOI: 10.1007/978-3-319-08344-5_19
ISSN: 0302-9743
-
Practical Card-Based Cryptography Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya
FUN WITH ALGORITHMS, Lecture Notes in Computer Science 8496 313-324 2014
DOI: 10.1007/978-3-319-07890-8_27
ISSN: 0302-9743
-
On the length-decreasing self-reducibility and the many-one-like reducibilities for partial multivalued functions Peer-reviewed
Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya
IEICE Transactions on Information and Systems E96-D (3) 465-471 2013
Publisher: Institute of Electronics, Information and Communication, Engineers, IEICEDOI: 10.1587/transinf.E96.D.465
ISSN: 1745-1361 0916-8532
-
Toward separating the strong adaptive pseudo-freeness from the strong RSA assumption Peer-reviewed
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya
Proc. ACISP 2013, Lecture Notes in Computer Science 7959 72-87 2013
DOI: 10.1007/978-3-642-39059-3_6
ISSN: 0302-9743 1611-3349
-
NP-Complete Sets for Computing Discrete Logarithms and Integer Factorization Peer-reviewed
Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
Interdisciplinary Information Sciences 19 (2) 129-134 2013
DOI: 10.4036/iis.2013.129
-
Distributed Construction of Trust Anchor with the Hyper-Powering Signature Scheme Peer-reviewed
Eisuke Koizumi, Marika Minagawa, Hiroki Shizuya
Interdisciplinary Information Sciences 18 (1) 25-36 2012/11
DOI: 10.4036/iis.2012.25
-
On the complexity of computing discrete logarithms over algebraic tori Peer-reviewed
Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya
International Conference on Cryptology and Network Security (CANS 2009), Lecture Notes in Computer Science 5888 433-442 2009
-
Making cryptographic primitives harder Peer-reviewed
Shingo Hasegawa, Hiroyuki Hatanaka, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya
IEICE Trans on Fundamentals E91A (1) 330-337 2008/01
DOI: 10.1093/ietfec/e91-a.1.330
ISSN: 1745-1337
-
NPMV-complete functions that compute discrete logarithms and integer factorization Peer-reviewed
Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
IEICE Trans on Fundamentals E91A (1) 342-344 2008/01
DOI: 10.1093/ietfec/e91-a.1.342
ISSN: 0916-8508
eISSN: 1745-1337
-
Toward Separating Integer Factoring from Discrete Logarithm mod p Peer-reviewed
Shuji ISOBE, Wataru KUMAGAI, Masahiro MAMBO, Hiroki SHIZUYA
IEICE Trans Fundamentals E90-A (1) 48-53 2007
DOI: 10.1093/ietfec/e90-a.1.48
ISSN: 0916-8508 1745-1337
-
A Countermeasure for Protecting NTRUSign against the Transcript Attack Peer-reviewed
Shingo HASEGAWA, Shuji ISOBE, Masahiro MAMBO, Hiroki SHIZUYA, Yuichi FUTA, Motoji OHMORI
Interdisciplinary Information Sciences 13 (2) 181-188 2007
DOI: 10.4036/iis.2007.181
ISSN: 1340-9050 1347-6157
-
The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem Peer-reviewed
Chisato Konoma, Masahiro Mambo, Hiroki Shizuya
IEICE Trans on Fundamentals E88-A (1) 81-88 2005/01
DOI: 10.1093/ietfec/E88-A.1.81
ISSN: 0916-8508 1745-1337
-
On the Polynomial Time Computability of Abstract Ray-Tracing Problem Peer-reviewed
Shuji ISOBE, Tetsuo KURIYAMA, Masahiro MAMBO, Hiroki SHIZUYA
IEICE Trans. on Fundamentals E88-A (5) 1209-1213 2005
DOI: 10.1093/ietfec/e88-a.5.1206
ISSN: 0916-8508 1745-1337
-
Complexity analysis of the cryptographic primitive problems through square-root exponent Peer-reviewed
Chisato Konoma, Masahiro Mambo, Hiroki Shizuya
IEICE Trans. Fundamentals E87-A (5) 1083-1091 2004
-
Characterization of optimal key set protocols Peer-reviewed
T Mizuki, H Shizuya, T Nishizeki
Discrete Applied Mathematics 131 (1) 213-236 2003/09
DOI: 10.1016/S0166-218X(02)00426-2
ISSN: 0166-218X
-
A note on the relationships among certified discrete log cryptosystems Peer-reviewed
E Chida, T Itoh, H Shizuya
IEICE Trans on Fundamentals E86A (5) 1198-1202 2003/05
ISSN: 0916-8508
eISSN: 1745-1337
-
On the Strength of the Strong RSA Assumption Peer-reviewed
Shintaro ITAGAKI, Masahiro MAMBO, Hiroki SHIZUYA
IEICE Trans. Fundamentals E86-A (5) 1164-1170 2003
-
On the Security of Girault Key Agreement Protocols against Active Attacks Peer-reviewed
Soo-Hyun OH, Masahiro MAMBO, Hiroki SHIZUYA, Dong-Ho WON
IEICE Trans Fundamentals E86-A (5) 1181-1189 2003
-
A Complete Characterization of a Family of Key Exchange Protocols Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
International Journal of Information Security 1 (2) 131-142 2002/02
-
Provably hard zero-way functions Peer-reviewed
Eikoh Chida, Li Li, Hiroki Shizuya
Interdisciplinary Information Sciences 8 (1) 57-61 2002
-
Spending Offline Divisible Coins with Combining Capability Peer-reviewed
Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya
Indocrypt 2002, Lecture Notes in Computer Science 2551 339-353 2002
-
Secure Access Ports with Authentication Using Inexpensive Switches and the Secure Shell Peer-reviewed
Hideaki Goto, Masahiro Mambo, Hiroki Shizuya
IEICE Trans D-I (Japanese Edition) J84-D-I (10) 1502-1505 2001
-
A Way of Making Trapdoor One-Way Functions Trapdoor No-Way Peer-reviewed
Eikoh CHIDA, Motoji OHMORI, Hiroki SHIZUYA
IEICE Trans. Fundamentals E84-A (1) 151-156 2001
-
On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks Peer-reviewed
Seungjoo KIM, Masahiro MAMBO, Takeshi OKAMOTO, Hiroki SHIZUYA, Mitsuru TADA, Dongho WON
IEICE Trans. Fundamentals E84-A (1) 231-238 2001
-
Evaluation of tamper-resistant software deviating from structured programming rules Peer-reviewed
Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe
Information Security Workshop (ISW 2000), Lecture Notes in Computer Science 2119 145-158 2001
Publisher: Springer VerlagISSN: 1611-3349 0302-9743
-
On the complexity of constructing an elliptic curve of a given order Peer-reviewed
M Yamamichi, M Mambo, H Shizuya
IEICE Trans on Fundamentals E84A (1) 140-145 2001/01
ISSN: 1745-1337
-
On the Average Length of Secret Key Exchange Eulerian Circuits (Journal version) Peer-reviewed
Takaaki Mizuki, Zhi-B Sui, Hiroki Shizuya, Takao Nishizeki
IEICE Trans on Fundamentals E83A (4) 662-670 2000/04
ISSN: 0916-8508
eISSN: 1745-1337
-
On the average length of secret key exchange Eulerian circuits Peer-reviewed
Takaaki Mizuki, Zhi-Bo Sui, Hiroki Shizuya, Takao Nishizeki
Proc. Japan-Korea Joint Workshop on Algorithms and Computation (WAAC 2000) 41-48 2000
-
A Necessary and Sufficient Condition for a Key Set Protocol Using Random Deal of Cards to be Optimal Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
IEICE Trans A (Japanese Edition) J83-A (5) 545-553 2000
-
Characterization of optimal key set protocols Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
Proc. IFIP TCS 2000, Lecture Notes in Computer Science 1872 273-285 2000
-
On the Complexity of Languages Associated with Discrete Log Cryptosystems
Takaharu Ohmi, Hiroki Shizuya, Takao Nishizeki
IEICE Trans A (Japanese Edition) J82-A (3) 405-414 1999
-
A Necessary and Sufficient Condition on the Numbers of Dealt Cards for Sharing Secret Key Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
IEICE Trans A (Japanese Edition) J82-A (1) 90-103 1999
-
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme (Journal version) Peer-reviewed
Masahiro MAMBO, Hiroki SHIZUYA
IEICE Trans. Fundamentals E82-A (1) 77-80 1999
-
On the \Sigma_1^b-definability of Integer Factoring Peer-reviewed
Mitsuru Tada, Hiroki Shizuya
IPSJ Transactions 40 (12) 4362-4369 1999
-
On the Difficulty of Searching for a String without Decryption Peer-reviewed
Takako ITO, Hiroki SHIZUYA
IEICE Trans. Fundamentals E82-A (1) 134-137 1999
-
Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key (Extended abstract) Peer-reviewed
T Mizuki, H Shizuya, T Nishizeki
ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, Lecture Notes in Compputer Science 1592 389-401 1999
ISSN: 0302-9743
-
Eulerian secret key exchange Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
Computing and Combinatorics (COCOON '98), Lecture Notes in Computer Science 1449 349-360 1998/08
-
Sharing Secret Keys along the Shortest Eulerian Circuit Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
IEICE Trans A (Japanese Edition) J81-A (4) 724-732 1998
-
Sharing Secret Keys along an Eulerian Circuit with the Minimum Number of Cards Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
IEICE Trans A (Japanese Edition) J81-A (4) 714-723 1998
-
Sharing Secret Keys along an Eulerian Circuit Peer-reviewed
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
IECE Trans A (Japanese edition) J81-A (4) 703-713 1998
-
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme Peer-reviewed
Masahiro MAMBO, Hiroki SHIZUYA
International Workshop on Theory and Practice in Public Key Cryptography, Lecture Notes in Computer Science 1431 258-262 1998
-
A Progress Report on Subliminal-free Channels Peer-reviewed
Mike Burmester, Yvo G. Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung
Information Hiding, Lecture Notes in Computer Science 1174 157-168 1996
-
On the Complexity of the Discrete Logarithm for a General Finite Group Peer-reviewed
Tatsuaki OKAMOTO, Kouichi SAKURAI, Hiroki SHIZUYA
IEICE Trans. Fundamentals E79-A (1) 61-65 1996
-
On the one-way algebraic homomorphism Peer-reviewed
E Chida, T Nishizeki, M Ohmori, H Shizuya
IEICE Trans on Fundamentals E79A (1) 54-60 1996/01
ISSN: 1745-1337
-
One-Way Functions over Finite Near-Rings Peer-reviewed
Eikoh CHIDA, Hiroki SHIZUYA, Takao NISHIZEKI
IEICE Trans. Fundamentals E78-A (1) 4-10 1995
-
Relationships among the computational powers of breaking discrete log cryptosystems Peer-reviewed
Kouichi Sakurai, Hiroki Shizuya
Advances in Cryptology, Proc. Eurocrypt'91, Lecture Notes in Computer Science 921 341-355 1995
Publisher: Springer VerlagISSN: 1611-3349 0302-9743
-
Demonstrating Possession without Revealing Factors Peer-reviewed
Hiroki SHIZUYA, Kenji KOYAMA, Toshiya ITOH
IEICE Trans. Fundamentals E77-A (1) 39-46 1994
-
Language Dependent Secure Bit Commitment Peer-reviewed
Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
Advances in Cryptology, Proc. Crypto'94, Lecture Notes in Computer Science 839 188-201 1994
-
A Note on AM Languages outside NP \cup co-NP Peer-reviewed
H SHIZUYA, T ITOH
IEICE Trans on Fundamentals E77A (1) 65-71 1994/01
ISSN: 0916-8508
eISSN: 1745-1337
-
Statistical Test of Random Pulse Stream (RPS) Generators for Communication Immunity Test Peer-reviewed
Hideo Suzuki, Minoru Kohata, Hiroki Shizuya, Tasuku Takagi
IEICE Trans B-II (Japanese Edition) J76-B-II (1) 53-61 1993
-
Any Language in IP Has a Divertible ZKIP Peer-reviewed
Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya
Advances in Cryptology, Proc. Asiacrypt'91, Lecture Notes in Computer Science 739 420-428 1993
-
How intractable is the discrete logarithm for a general finite group? Peer-reviewed
Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya
Advances in Cryptology, Proc. Eurocrypt'92, Lecture Notes in Computer Science 658 420-428 1993
Publisher: Springer VerlagISSN: 1611-3349 0302-9743
-
On the Complexity of Hyperelliptic and Elliptic Discrete Logarithm Problem Peer-reviewed
H SHIZUYA, T ITOH, K SAKURAI
IEICE Trans on Fundamentals 74 (8) 2129-2135 1991/08
ISSN: 0917-1673
-
On the Complexity of Hyperelliptic Discrete Logarithm Problem Peer-reviewed
Hiroki SHIZUYA, Toshiya ITOH, Kouichi SAKURAI
Advances in Cryptology - Eurocrypt 91, Lecture Notes in Computer Science 547 337-351 1991
ISSN: 0302-9743
-
A Group-Theoretic Interface to Random Self-Reducibility Peer-reviewed
Hiroki SHIZUYA, Toshiya ITOH
Trans. of the IEICE E-73 (7) 1087-1091 1990
-
Demonstrating Possession without Revealing Factors and Its Application Peer-reviewed
Hiroki SHIZUYA, Kenji KOYAMA, Toshiya ITOH
Advances in Cryptology, Proc. Auscrypt'90, Lecture Notes in Computer Science 453 273-293 1990
ISSN: 0302-9743
-
A Public-Key Cryptosystem Based upon Generalized Inverse Matrix over Discrete Logarithmic Domain of Finite Field Peer-reviewed
Hiroki Shizuya, Tasuku Takagi
IEICE Trans A (Japanese Edition) J71-A (3) 825-832 1988
-
Fully Digital Gaussian Signal Source Peer-reviewed
Hideaki Sone, Hiroki Shizuya, Tasuku Takagi
IEICE Trans C (Japanese Edition) J70-C (7) 1101-1102 1987
-
An argumental expression of correlation function between arbitrary codewords Peer-reviewed
Hiroki Shizuya, Hideaki Sone, Hiroshi Echigo, Tasuku Takagi
Trans of the IECE E69 (12) 1294-1302 1986/12
-
Digital Gaussian Noise Generator with Multiplex M-Sequences Peer-reviewed
Hiroki Shizuya, Hideaki Sone, Hiroshi Echigo, Tasuku Takagi
IECE Trans (Japanese edition) J66-C (11) 882-883 1983
Misc. 9
-
Supersingular Isogeny-based Cryptography: A Survey Peer-reviewed
Philipp Stratil, Shingo Hasegawa, Hiroki Shizuya
Interdisciplinary Information Sciences 27 (1) 1-23 2021
-
Digital Money -- A Survey Peer-reviewed
Eikoh Chida, Masahiro Mambo, Hiroki Shizuya
Interdisciplinary Information Sciences 7 (2) 135-165 2001
-
Algorithms for Factorization and Discrete Logarithm Problem Invited Peer-reviewed
Kenji Koyama, Hiroki Shizuya
Journal of Information Processing Society of Japan 34 (2) 157-169 1993
-
Zero-Knowledge Proofs and Complexity Theory Invited Peer-reviewed
Hiroki Shizuya, Toshiya Itoh, Kouichi Sakurai
Journal of Information Processing Society of Japan 32 (6) 673-681 1991
-
A contour of information security education (in Japanese) Peer-reviewed
Hiroki Shizuya
Review on the literacy for information technology, new education and knowledge society (1) 72-83 2012
-
Sharing Secret Keys along an Eulerian Circuit
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
1997 Symposium on Cryptography and Information Security (SCIS'97), SCIS97-21C ["SCIS Best Paper Award" paper. Award recipient: Takaaki Mizuki] 1997
-
Book Review: "Science of Information Security - An Introduction to Magic Protocols" (in Japanese) by Kazuo Ohta, Kaoru Kurosawa and Osamu Watanabe, Kodansha Blue Backs B-1055, (1995). Invited
Hiroki Shizuya
Journal of the IEICE 78 (7) 726 1995/07
-
Opaque/Transparent Bit Commitment Functions and their Applications
Toshiya Itoh, Yuji Ohta, Hiroki Shizuya
1994 Symposium on Cryptography and Information Security (SCIS'94), SCIS94-12C ["SCIS Best Paper Award" paper. Award recipient: Yuji Ohta] 1994
-
One-Way Functions over Finite Near-Rings
Eikoh Chida, HIroki Shizuya, Takao Nishizeki
1994 Symposium on Cryptography and Information Security (SCIS'94), SCIS94-9B ["SCIS Best Paper Award" paper. Award recipient: Eikoh Chida] 1994
Books and Other Publications 8
-
Breaking new paths for academic research, Artes Liberales et Universitas, vol.8 (in Japanese)
Institute of Liberal Arts and Sciences, Tohoku University (Ed)
Tohoku University Press 2025/03
ISBN: 9784861634062
-
Rings of Reading 2024 -- Guide to Research and Lecture (in Japanese)
Institute of Liberal Arts and Sciences, Tohoku University
Institute of Liberal Arts and Sciences, Tohoku University 2024/03
-
Practice in Computational Thinking (in Japanese)
Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya, Yoshinori Hayakawa
KYORITSU SHUPPAN 2023/04
ISBN: 9784320125209
-
Information Ethics - Case Studies (in Japanese)
Hiroki Shizuya
Saiensu-sha 2008
-
Information Security Handbook (in Japanese)
IEICE (Ed)
Ohmsha 2004
-
IEICE Transactions on Fundamentals, Special Section on Cryptography and Information Security (vol.E84-A, no.1)
Hiroki Shizuya (Guest Editor)
IEICE 2001/01
-
Cryptography and Aiuthentication (in Japanese)
Society of Information Theory and Its Applications (Ed)
Baifukan 1996
-
Cryptography, Zero Knowledge Proof, Number Theory (in Japanese)
Tatsuaki Okamoto, Kazuo Ohta (Eds)
Kyoritsu Shuppan 1995
Industrial Property Rights 18
-
Tampering monitoring system, management device, protection control module, and detection module
Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Shuji Isobe, Atsushi Umeta
Property Type: Patent
-
Manipulation monitoring system, management device and manipulation management method
Yuichi Futa, Yuji Unagami, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
Property Type: Patent
-
Tampering monitoring system, control device, and tampering control method
Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Makoto Carlos Miyauchi
Property Type: Patent
-
Software updating apparatus, software updating system, alteration verification method and alteration verification program
Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka, Yuji Unagami, Hiroki Shizuya, Shingo Hasegawa, Marika Minagawa, Masao Sakai, Shuji Isobe, Eisuke Koizumi
Property Type: Patent
-
Software updating apparatus, software updating system, invalidation method, and invalidation
Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Kaoru Yokota, Masao Nonaka, Yuji Unagami, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Marika Minagawa
Property Type: Patent
-
Signature generation apparatus, signature verification apparatus, method thereof, and integrated circuit
Yuichi Futa, Shingo Hasagawa, Shuji Isobe, Motoji Ohmori, Hiroki Shizuya
Property Type: Patent
-
Tamper monitoring system, protection control module and detection module
Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Eisuke Koizumi, Shingo Hasegawa
Property Type: Patent
-
Tampering monitoring system, management apparatus, and management method
Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
Property Type: Patent
-
Illegal module identifying device, information processing device, illegal module identifying method, illegal module identifying program, integrated circuit, illegal module disabling system, and illegal module disabling method
Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Makoto Carlos Miyauchi
Property Type: Patent
-
Information processing device, management device, illegal module detection system, illegal module detection method, recording medium on which illegal module detection program is recorded, management method, recording medium and integrated circuit on which management method is recorded
Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Junya Iwazaki
Property Type: Patent
-
Software update system, management apparatus, recording medium, and integrated circuit
Yuji Unagami, Manabu Maeda, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
Property Type: Patent
-
Monitoring system, program-executing device, monitoring program, recording medium and integrated circuit
Manabu Maeda, Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Masao Nonaka, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa
Property Type: Patent
-
Signature and verification method, signature generation device, and signature verification device
Yuichi Futa, Hiroki Shizuya, Shuji Isobe, Shingo Hasegawa
Property Type: Patent
-
Shared information distributing device, holding device, certificate authority device, and system
Manabu Maeda, Masao Nonaka, Yuichi Futa, Kaoru Yokota, Natsume Matsuzaki, Hiroki Shizuya, Masao Sakai, Shuji Isobe, Eisuke Koizumi, Shingo Hasegawa, Masaki Yoshida
Property Type: Patent
-
Communication device and communication system
Yuichi Futa, Motoji Ohmori, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
Property Type: Patent
-
Signature generation device, key generation device, and signature generation method
Yuichi Futa, Shingo Hasegawa, Shuji Isobe, Motoji Ohmori, Hiroki Shizuya
Property Type: Patent
-
Signature generation device and signature verification device
Yuichi Futa, Shingo Hasegawa, Shuji Isobe, Motoji Ohmori, Hiroki Shizuya
Property Type: Patent
-
Signature generation device, and signature verification device
Yuichi Futa, Shingo Hasegawa, Shuji Isobe, Motoji Ohmori, Hiroki Shizuya
Property Type: Patent